- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Best practice to validate a user/pwd combination o...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-31-2001 04:42 AM
тАО01-31-2001 04:42 AM
I have an application where I want to check a unix user user/passwd combination on a system running in trusted mode. Since the tcb password database is not accessible, I would like to know the best practice to achieve this.
Regards & thanks,
Andreas.
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-31-2001 05:20 AM
тАО01-31-2001 05:20 AM
Re: Best practice to validate a user/pwd combination on trusted mode ?
You need to use the getprpw and modprpw commands, see attached manpages for them.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-31-2001 05:24 AM
тАО01-31-2001 05:24 AM
Re: Best practice to validate a user/pwd combination on trusted mode ?
Not sure to understand what you want to achieve.
Could you please explain?
Dan
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-31-2001 06:53 AM
тАО01-31-2001 06:53 AM
Re: Best practice to validate a user/pwd combination on trusted mode ?
I have a web based application that requires a user authentication related to an existing unix account of the application user.
I require that the user logs in providing his unix user name and password. So the web server has to prove if the password is correct. My question how to achive this in the best manner.
The current solution implements a script that uses crypt to encrypt the password that was entered by the user and compares it to the /etc/passwd entry. Regarding trusted mode I face the problem that the crypted password is naturally only accessible to root. To solve this issue I've implemented a small binary based on getprpwd() that verifies the password against the password database. But AFAK this binary must run with uid 0 to access the pwd database, so I've using the set-uid-on-file bit on that executable - not a nice solution.
Any help is appreciated,
Regards,
Andreas.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-31-2001 07:06 AM
тАО01-31-2001 07:06 AM
Re: Best practice to validate a user/pwd combination on trusted mode ?
This sounds clearer !
I'm afraid that you won't be able to avoid your 'setuid root' program to access the password database.
That's all a trusted system is about, i.e. prevent an unauthorized user to read the encrypted password.
All the best,
Dan
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО02-01-2001 07:15 PM
тАО02-01-2001 07:15 PM
Solution